- From: Ian Hickson via cvs-syncmail <cvsmail@w3.org>
- Date: Tue, 03 Nov 2009 23:01:03 +0000
- To: public-html-commits@w3.org
Update of /sources/public/html5/webstorage
In directory hutz:/tmp/cvs-serv9799
Modified Files:
Overview.html
Log Message:
Remove Web Database from the WHATWG complete spec; say that sqlite is the expected language; update the character references to the latest set. (whatwg r4374)
Index: Overview.html
===================================================================
RCS file: /sources/public/html5/webstorage/Overview.html,v
retrieving revision 1.93
retrieving revision 1.94
diff -u -d -r1.93 -r1.94
--- Overview.html 27 Oct 2009 19:47:09 -0000 1.93
+++ Overview.html 3 Nov 2009 23:01:01 -0000 1.94
@@ -599,7 +599,6 @@
executing, other than in a way that is predictable by the script
itself.<h2 id="disk-space"><span class="secno">5 </span>Disk space</h2><p>User agents should limit the total amount of space allowed for
-
storage areas.
<p>User agents should guard against sites storing data under the
origins other affiliated sites, e.g. storing up to the limit in
@@ -674,7 +673,6 @@
<p>If users attempt to protect their privacy by clearing cookies
without also clearing data stored in the
-
local storage area,
sites can defeat those attempts by using the two features as
redundant backup for each other. User agents should present the
@@ -748,12 +746,10 @@
SSL can be sure that only pages using SSL that have certificates
identifying them as being from the same domain can access their
-
storage areas.
<h3 id="cross-directory-attacks"><span class="secno">7.2 </span>Cross-directory attacks</h3><p>Different authors sharing one host name, for example users
hosting content on <code>geocities.com</code>, all share one
-
local storage object.
There is no feature to restrict the access by pathname. Authors on
shared hosts are therefore recommended to avoid using these
Received on Tuesday, 3 November 2009 23:01:12 UTC